全文获取类型
收费全文 | 506篇 |
免费 | 0篇 |
专业分类
506篇 |
出版年
2021年 | 5篇 |
2019年 | 13篇 |
2018年 | 9篇 |
2017年 | 12篇 |
2016年 | 9篇 |
2015年 | 10篇 |
2013年 | 85篇 |
2011年 | 5篇 |
2010年 | 7篇 |
2009年 | 4篇 |
2007年 | 7篇 |
2006年 | 7篇 |
2005年 | 13篇 |
2004年 | 8篇 |
2003年 | 5篇 |
2001年 | 4篇 |
2000年 | 9篇 |
1999年 | 6篇 |
1998年 | 5篇 |
1997年 | 9篇 |
1996年 | 12篇 |
1995年 | 5篇 |
1994年 | 10篇 |
1993年 | 8篇 |
1992年 | 8篇 |
1991年 | 14篇 |
1990年 | 8篇 |
1989年 | 12篇 |
1988年 | 6篇 |
1987年 | 12篇 |
1986年 | 9篇 |
1985年 | 12篇 |
1984年 | 10篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 11篇 |
1979年 | 8篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 9篇 |
1975年 | 6篇 |
1974年 | 11篇 |
1973年 | 8篇 |
1972年 | 9篇 |
1971年 | 13篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 3篇 |
1966年 | 3篇 |
排序方式: 共有506条查询结果,搜索用时 0 毫秒
381.
A. Gmez‐Corral 《海军后勤学研究》1999,46(5):561-581
Retrial queueing systems are widely used in teletraffic theory and computer and communication networks. Although there has been a rapid growth in the literature on retrial queueing systems, the research on retrial queues with nonexponential retrial times is very limited. This paper is concerned with the analytical treatment of an M/G/1 retrial queue with general retrial times. Our queueing model is different from most single server retrial queueing models in several respectives. First, customers who find the server busy are queued in the orbit in accordance with an FCFS (first‐come‐first‐served) discipline and only the customer at the head of the queue is allowed for access to the server. Besides, a retrial time begins (if applicable) only when the server completes a service rather upon a service attempt failure. We carry out an extensive analysis of the queue, including a necessary and sufficient condition for the system to be stable, the steady state distribution of the server state and the orbit length, the waiting time distribution, the busy period, and other related quantities. Finally, we study the joint distribution of the server state and the orbit length in non‐stationary regime. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 561–581, 1999 相似文献
382.
Nikolay I. Geraskin Andrey A. Krasnoborodko Taisia A. Piskureva 《Defense & Security Analysis》2015,31(4):330-345
In 2002, a Nuclear Security Culture (NSC) Enhancement Program with the mission to raise the level of the NSC at sites and facilities in Russia's nuclear complex was launched under the guidance of the Russian State Corporation “ROSATOM” and with support from the US Department of Energy. A Joint Working Group for NSC with both Russian Federation and US members was formed and charged with the design and implementation of the program. The program was implemented at sites and facilities on a pilot basis. Nine sites participated in the Pilot Project. The key program component was an establishment of Culture Coordinators (CCs) with the authority to coordinate and implement NSC enhancement activities at sites and facilities. The CCs have served as the force that has maintained the momentum of the Pilot Project and continuously steered the site NSC enhancement efforts. The contribution of the CCs in achieving the positive outcomes of the program cannot be overstated. 相似文献
383.
Tactical learning is critical to battlefield success, especially in a counterinsurgency. This article tests the existing model of military adaption against a ‘most-likely’ case: the British Army’s counterinsurgency in the Southern Cameroons (1960–61). Despite meeting all preconditions thought to enable adaptation – decentralization, leadership turnover, supportive leadership, poor organizational memory, feedback loops, and a clear threat – the British still failed to adapt. Archival evidence suggests politicians subverted bottom-up adaptation, because winning came at too high a price in terms of Britain’s broader strategic imperatives. Our finding identifies an important gap in the extant adaptation literature: it ignores politics. 相似文献
384.
A classic problem in Search Theory is one in which a searcher allocates resources to the points of the integer interval [1, n] in an attempt to find an object which has been hidden in them using a known probability function. In this paper we consider a modification of this problem in which there is a protector who can also allocate resources to the points; allocating these resources makes it more difficult for the searcher to find an object. We model the situation as a two‐person non‐zero‐sum game so that we can take into account the fact that using resources can be costly. It is shown that this game has a unique Nash equilibrium when the searcher's probability of finding an object located at point i is of the form (1 − exp (−λixi)) exp (−μiyi) when the searcher and protector allocate resources xi and yi respectively to point i. An algorithm to find this Nash equilibrium is given. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47:85–96, 2000 相似文献
385.
A new technique for solving large‐scale allocation problems with partially observable states and constrained action and observation resources is introduced. The technique uses a master linear program (LP) to determine allocations among a set of control policies, and uses partially observable Markov decision processes (POMDPs) to determine improving policies using dual prices from the master LP. An application is made to a military problem where aircraft attack targets in a sequence of stages, with information acquired in one stage being used to plan attacks in the next. © 2000 John Wiley & Sons, Inc., Naval Research Logistics 47: 607–619, 2000 相似文献
386.
Damage tolerant methodology is increasingly used in aeronautical components,especially due the fact that the Aviation Regulation requires such an assessment in case an accidental damage occurs.At pre-sent,there is a strong and actual interest in applying such procedures to helicopter components that are subjected to high frequency cyclic loads.In this paper,an investigation on a damaged transmission shaft for a tail rotor transmission of an actual helicopter has been carried out focusing on the fatigue crack propagation.A complete sequence of experimental tests was performed in order to create an actual ballistic damage and to subsequently check the damage tolerant behaviour.The shaft was damaged by oblique ballistic impact and was subsequently subjected to torsional fatigue loading.During the fatigue cycles several cracks propagated from the ballistic damages.Both of these steps(impact and fatigue loading)were also simulated by a complex modelling approach based on Finite Element Models and fracture mechanics theory.The comparison between the experimental and numerical results shows a good agreement but it underlines the need for a very refined modelling technique capable to replicate all the features associated with the damage in order to reliably simulate the subsequent propagation phase. 相似文献
387.
G. Martynenko K. Avramov V. Martynenko M. Chernobryvko A. Tonkonozhenko V. Kozharin 《防务技术》2021,17(2):478-494
The new numerical approach for analysis of the warhead transportations is suggested.This approach allows to control the warhead operability before its experimental analysis.The approach is implemented by the adequate models for the software ANSYS.Analysis of the loads at land operations and trans-portations of the warhead by natural roads,water and aviation allows to obtain the maximal values of loads,which are used in numerical simulations of the warhead.These loads give an opportunity to analyze the operability and the fatigue strength of the cartridge warhead.The numerical simulations of the attachments of the warhead combat elements are performed on the basis of the suggested method.The data of the numerical simulations verifies the operability of the fastener system of the warhead combat elements. 相似文献
388.
Donald P. Gaver Patricia A. Jacobs Gennady Samorodnitsky Kevin D. Glazebrook 《海军后勤学研究》2006,53(6):588-599
This paper describes modeling and operational analysis of a generic asymmetric service‐system situation in which (a) Red agents, potentially threatening, but in another but important interpretation, are isolated friendlies, such as downed pilots, that require assistance and “arrive” according to some partially known and potentially changing pattern in time and space; and (b) Reds have effectively limited unknown deadlines or times of availability for Blue service, i.e., detection, classification, and attack in a military setting or emergency assistance in others. We discuss various service options by Blue service agents and devise several approximations allowing one to compute efficiently those proportions of tasks of different classes that are successfully served or, more generally, if different rewards are associated with different classes of tasks, the percentage of the possible reward gained. We suggest heuristic policies for a Blue server to select the next task to perform and to decide how much time to allocate to that service. We discuss this for a number of specific examples. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006. 相似文献
389.
We consider the effects of cueing in a cooperative search mission that involves several autonomous agents. Two scenarios are discussed: one in which the search is conducted by a number of identical search‐and‐engage vehicles and one where these vehicles are assisted by a search‐only (reconnaissance) asset. The cooperation between the autonomous agents is facilitated via cueing, i.e., the information transmitted to the agents by a searcher that has just detected a target. The effect of cueing on the target detection probability is derived from first principles using a Markov chain analysis. In particular, it is demonstrated that the benefit of cueing on the system's effectiveness is bounded. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献
390.
The paper addresses the problem of a patrol trying to stop smugglers who are attempting to ship a cargo of perishable contraband across a strait in one of M time units. The situation was modeled as a two-person zero-sum game of exhaustion by Thomas and Nisgav and this article extends their results. The game has many characteristics in common with the Inspection Game in Owen's book on Game Theory; this Inspection Game is generalized and the relations between the two games are discussed. 相似文献